Sciweavers

40 search results - page 7 / 8
» Fingerprint-Based Location Estimation with Virtual Access Po...
Sort
View
IJNSEC
2006
134views more  IJNSEC 2006»
14 years 11 months ago
Physical Security Perimeters for Wireless Local Area Networks
On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks s...
Vishal Bhargava, Mihail L. Sichitiu
76
Voted
PERVASIVE
2005
Springer
15 years 4 months ago
Place Lab: Device Positioning Using Radio Beacons in the Wild
Location awareness is an important capability for mobile computing. Yet inexpensive, pervasive positioning—a requirement for wide-scale adoption of location-aware computing—has...
Anthony LaMarca, Yatin Chawathe, Sunny Consolvo, J...
104
Voted
MOBICOM
2006
ACM
15 years 4 months ago
Multipath profile discrimination in TOA-based WLAN ranging with link layer frames
Indoor ranging and location in WLAN is possible through obtaining Round-Trip-Time (RTT) measurements at data link level. This procedure allows using the existing IEEE 802.11 WLAN ...
Marc Ciurana, Francisco Barceló, Sebastiano...
MOBIHOC
2006
ACM
15 years 10 months ago
Modeling steady-state and transient behaviors of user mobility: : formulation, analysis, and application
Recent studies on mobility modeling have focused on characterizing user mobility from real traces of wireless LANs (WLANs) and creating mobility models based on such characterizat...
Jong-Kwon Lee, Jennifer C. Hou
CORR
2007
Springer
160views Education» more  CORR 2007»
14 years 11 months ago
On the Correlation of Geographic and Network Proximity at Internet Edges and its Implications for Mobile Unicast and Multicast R
Signicant eort has been invested recently to accelerate handover operations in a next generation mobile Internet. Corresponding works for developing ecient mobile multicast man...
Thomas C. Schmidt, Matthias Wählisch, Ying Zh...